RSI Security

What is a HITRUST Bridge Assessment?

Cyber

Many companies sit at the intersection of multiple sectors. This can be a lucrative position, but it also requires surveying the specific cybersecurity risks across industries. To address the needs of these companies, HITRUST Alliance published the Common Security Framework (CSF). However, to accommodate companies struggling to meet compliance requirements after the COVID-19 pandemic, the HITRUST bridge assessment can be the difference between lapsing in protection and recovering fully. 

Let’s take a closer look.

 

What is a HITRUST Bridge Assessment?

HITRUST CSF compliance is exceptionally comprehensive. Even previously certified institutions may struggle to meet validation deadlines — especially given the pandemic and its aftermath. Bridge assessments aren’t a replacement for full compliance. Instead, they are available to help these organizations extend their window and eventually achieve complete recertification.

In this blog, we’ll break down everything you need to know about the HITRUST bridge assessment and overall HITRUST CSF compliance. Topics covered below include:

By the time we’re done, you’ll be well-positioned to move forward into bridge assessment in the short term, then full compliance in the long term. But first, let’s review what exactly HITRUST is.

 

What is HITRUST, and Why is it Important?

Companies’ concerns about “HITRUST” usually refer to compliance with the HITRUST CSF specifically. But the CSF itself is just one part of the overall HITRUST Approach, a much more holistic system or program of data protection, information risk management, and compliance.

The HITRUST Approach includes all solutions HITRUST offers (the CSF, Risk Management Frameworks, etc.). Its principles constitute a cyclical set of steps toward robust cybersecurity:

This approach is crucial, not least because of its simplicity. As you’ll see below, implementing the HITRUST frameworks themselves can be complex and challenging. Simplicity at the top level allows for a streamlined approach without compromising the quality and integrity of security.

Similarly, the Bridge Assessment program is a means toward simplification to make recertification slightly more accessible, especially in the crisis many companies are facing.

 

Assess your HITRUST compliance

 

Leveraging HITRUST Bridge Assessment

HITRUST implemented the Bridge Assessment early in 2020 to assist companies struggling to achieve timely reassessment. HITRUST’s press release for the Bridge program notes that, due to the immediate and long-term impacts of the COVID-19 pandemic, many businesses have had trouble submitting their CSF Validated Assessments before deadlines.

Companies facing these troubles are prone to many other consequences. 

On the one hand, HITRUST is a primary means by which many companies comply with other legally mandated frameworks. On the other hand, a lapse in compliance often portends lax cybersecurity as a whole, meaning these companies are at risk of being exposed to the dangers of cybercrime.

The Bridge Assessment and resulting HITRUST CSF Bridge Certificate comprise an ideal solution for companies in a bind. It is not an “extension” of existing certification, nor is it a “replacement” for traditional certification. Due to the less intensive assessment procedure, Bridge Certification provides a lesser level of assurance. It’s a means to prove companies’ controls are unlikely to have degraded after certification, and full compliance is soon to come.

But Bridge Assessment is by no means simple to achieve. Let’s take a close look at the process and requirements through which companies can accomplish CSF Bridge Certification.

How the HITRUST Bridge Assessment Works

Companies may be eligible for Bridge Assessment (and Certification) for 90 days after the expiration of their previous CSF Certification period. Furthermore, according to HITRUST’s guide to the Bridge Assessment, the Bridge Certification process breaks down as follows:

Ultimately, the relationship between the Bridge Certification and CSF Certification is forgiving in some ways and demanding in others. Having CSF controls firmly established facilitates Bridge Assessment and bypasses rigorous analysis. But taking advantage of Bridge Certification won’t net you any “extra” month of coverage since they are subtracted from your next period.

 

Understanding HITRUST CSF Certification

As noted above, Bridge Certification is not an extension or replacement for compliance. You’ll still need to implement all CSF controls beyond the 19 assessed for the Bridge Certificate. Colloquial nicknames for the Bridge Assessment, such as “HITRUST gap assessment,” belie the importance of understanding CSF to avoid gaps in your overall HITRUST coverage.

In total, the HITRUST CSF comprises 156 “Control References” to implement, spread across its 49 “Objective Names” and 14 “ Control Categories.” These are influenced by, and often directly adapted from, the requirements of other compliance frameworks. The NIST Cybersecurity Framework, HIPAA, HITECH, and PCI Data Security Standard are some of the primary sources.

The full text of the CSF is available for free download, but only for organizations that sign a qualifying license agreement. In practice, this means few organizations have access to the text itself. But don’t worry: below, we’ll provide a synopsis of all the controls your business will need to implement for compliance, sourced directly from HITRUST CSF v.9.4.1.

 

Breakdown of the HITRUST CSF Framework

While the HITRUST framework also provides Specifications, Mapping, and other guidance for each Reference, the References themselves are most analogous to individual Controls. All in all, the Control Categories, Objective Names, and Controls References break down as follows:

Implementation of all controls across all Categories is not enough to guarantee complete verification or certification. Your business will need to submit a self-assessment (in addition to third-party validation), depending on the target level of compliance assurance sought by the company.

 

Achieving Full HITRUST Certification

Compliance requires reporting on (and potentially verifying) your implementation of all CSF controls. At the most basic level, and outside of Bridge-related compliance, companies can choose to self-assess their performance by submitting the Self-Assessment Report, available from HITRUST directly or through subscription to the MyCSF toolkit. In addition, other self-service tools include the HITRUST Academy and HITRUST Readiness Assessment.

 There are two levels to consider to achieve full compliance: validation and certification.

According to HITRUST’s guide to CSF Assessments, both require working with an Authorized External Assessor. Both also require submitting a HITRUST CSF Validated Assessment Report. If the Report meets HITRUST’s score requirements, your company may qualify for Certification. If it doesn’t, you may still be eligible for Validation. Validation lasts for one calendar year, while certification lasts for two years (pending the submission of an Interim Assessment after one year).

Unlike the Bridge Assessment, a HITRUST CSF Interim Assessment does not subtract or in any other way negatively impact the total number of months your certification lasts.

 

How Compliance Advisory Services Can Help

As noted above, full compliance (verification or certification) requires a third-party’s assistance for at least the final assessment stage. Given the challenges of implementing all the necessary controls, it’s in many organizations’ best interests to work with a service provider from the first touchpoint of the process. 

To that end, here at RSI Security, we offer a suite of HITRUST advisory services, including:

With over a decade of experience helping companies achieve HITRUST compliance, as well as compliance with other regulatory frameworks, we are well-positioned to help you get Certified.

 

Professional Certification and Cyberdefense

The talented team of experts here at RSI Security is happy to help your company with all of its compliance and cybersecurity planning and implementation — no matter the nature and size of your business. We’ll tailor a suite of IT and security services to meet your needs and means.

For many companies, compliance with a robust regulatory framework like HITRUST is a one-size-fits-all solution to their cybersecurity concerns. For many others, however, compliance is just the start of the cybersecurity journey. 

And for all cybersecurity needs, there’s us. 

To see how valuable a HITRUST bridge assessment can be for your company, contact RSI Security today!
 

 


Download Our HITRUST Compliance Checklist

Assess where your organization currently stands with being HITRUST compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.

Exit mobile version